THE N>S>A> TACTICS EXPLAINED

N>S>A> TAO UNIT

The TAO unit is, for all intents and purposes, a hacking group. The TAO aims to exploit hardware and software to gather intelligence on supposedly foreign entities. This is facilitated by gaining access to telecommunication companies that operate the backbone of the Internet and capturing Internet traffic, as well as intercepting physical devices and inserting monitoring capabilities onto them. Since its inception in 1998, the group has grown to be one of the most important parts of the NSA because of society’s reliance on computers and the access necessary to monitor those communications. The TAO unit was designed to extend previous capabilities for monitoring radio communications to general monitoring of a broad array of networked systems. Since a potential target could be using practically any technology, the TAO unit likely targets network equipment because of the limited number of devices to attack and the broad access it could offer.

In the now infamous files leaked by former NSA contractor Edward Snowden, details of the TAO unit’s tasks, capabilities and functions were released to the general public. For example, the documents exposed information concerning how to compromise systems before they leave the manufacturer, even if they are never connected to a TCP/IP network and other scenarios. Some of the concepts believed to be pioneered by TAO have since been used in credit card skimmer attacks and even USB-based malware. Additionally, there have been many examples of hardware or software shipped with malware already installed and instances of vendors shipping devices where even the most basic security evaluations were not undertaken. While enterprises should plan for and defend against these threats, they must first know how to accomplish it.

The NSA has interrupted the supply chain in attacks so that its monitoring tools will already be present on systems before the devices even connect to a target network. Unfortunately, the supply chain weaknesses are not well understood by enterprises and most are ill-prepared to address hardware that has physical tools already installed on them for intelligence gathering. The physical tool could just send communications to an outside party or it could be used to provide persistence even if the currently installed OS is removed.

While enterprises could reinstall factory operating systems, it is advisable to monitor newly installed systems for any suspicious network access prior to putting them into the production environment.

The reports detailing the NSA’s capabilities are both good and bad: not only do they give the good guys hints about areas to investigate, but they also provide insight for the bad guys and potentially help them shorten the development cycle of future attacks. In regard to man-in-the-middle attacks, the TAO’s QUANTUM program offers fascinating detail on how a communication channel can be monitored, even if the communication channel is encrypted. Enterprises should be aware that attackers outside the NSA are likely hard at work refining the techniques on the QUANTUM capabilities list and will soon seek to apply them to their own targeted attacks — this may already be happening.

Defending TAO techniques: What can be done?

One of the most valuable after effects of the leaks has been giving individuals and enterprises alike the knowledge of where particular technologies and processes, such as network communications and supply chains, are vulnerable to creative attack methods. This should certainly help enterprises prioritize resource allocation toward the defense measures that are needed to prevent falling prey to these issues.

While defending against the NSA itself as a U.S. company simply isn’t feasible, enterprises do have some options. Prior to adopting new hardware or software, enterprises should validate it for tampering. On the other hand, vendors could also provide customers with a method to validate that software and hardware hasn’t been tampered with, such as using signed software. These same steps could be used on a regular basis to look for suspicious activity.

It is also important that enterprises and individuals assume any and all communication is being monitored, even on dedicated circuits. Implementing encryption for all communications beyond merely using a VPN will help thwart tapping and eavesdropping. Enterprises with high security requirements could even protect against attacks using wireless communications through a Faraday cage, though it is unreasonable for most organizations. Alternately, enterprises could get a radio frequency monitor to sweep through their facilities and monitor for unauthorized connections. This is similar to monitoring the network for any suspicious network connections.

In addition to presuming that all lines of communication are being monitored, enterprises could also heed some of the NSA’s own advice around assuming that their businesses are also compromised. It can help keep organizations on their toes if they think they are being targeted by better funded, smarter and more advanced attackers.

EUROGENDFOR: Die geheime EU-Spezialeinheit zur Niederschlagung von Aufständen (Video)

aheneghana:

EUROGENDFOR – read ( German )

Originally posted on PRAVDA TV - Live The Rebellion:

eurogendfor-europa-privatermee

Die EU hat sich mit den Geldern europäischer Länder ja was Schönes zusammengebastelt.

Die EUROGENDFOR ist eine schnelle Eingreiftruppe die in Krisengebieten, Aufstände niederschlagen soll. Dabei hat diese Truppe alle Vollmachten um zu tun und zu lassen was sie will. Das Töten von Menschen ist gesetzlich festgeschrieben. Somit ist die EUROGENDFOR eine Truppe die sich in keinem europäischen Land dessen gesetzlichen Bestimmung unterordnen muss.

Die EUROGENDFOR selbst besteht aus rund 700 bis 800 ständig einsatzbereiten „Kämpfern“ und rund 2.300 harren im Reservistenmodus der Dinge die da kommen, sodass eine Gesamtstärke von gut 3.000 Mann mobilisierbar ist. Gegründet wurde die EUROGENDFOR von Frankreich, Italien, Spanien, Portugal und den Niederlanden.

Deutschland spielt hier nicht mit, weil es eine andere Auffassung zur Aufgabenteilung zwischen Polizei und Militär vertritt und deshalb diese Mischform ablehnt – bis jetzt noch?

Diese Truppe verkörpert alle Gattungen, vom Polizisten bis zum Soldaten, einschließlich eigenem Geheimdienst.

Wer sich für…

View original 1,099 more words

Spring is…

aheneghana:

Sometimes we all wish to be living on a ranch .

Originally posted on Meanwhile, back at the ranch...:

Sometimes the day is so lovely, you just have to go out in it.

Sometimes the moon shows up before the sun goes down and lines up just right in the blue sky hovering peacefully over golden grass.

Grass that was hiding under all that snow, snow that’s melting because it’s 50 degrees ABOVE zero now, so you decide to pull on your muck boots and splash around in it a little, feeling so good you don’t even mind the little hole in the right one that lets the water in to soak your socks.

It doesn’t matter. It’s summer now.

Your feet don’t get cold in the summer.

And you took your camera, because you need to document what a beautiful mess it all is when the thaw comes.

You need to photograph those tiny bubbles.

You need to capture those trees standing nice and tall and straight.

You…

View original 61 more words

scenery of East island lake

The legend of ‘Island of lost souls’ has been mentioned in a previous post.
This covers photography of the beautiful island – as posted on http://instagram.com/nicecotedazur1
(our instagram page)

Rocks In Chinese Gardens

aheneghana:

I always find his blog postings extremely interesting.

Originally posted on retireediary:

Every Chinese garden has some type of rock element. Some designers opt for a simple rock garden, while others construct miniature mountains from an assorted collection of rocks.

This is  a view of the layered rocks by the side of a lake in the garden of Xian Shan in Beijing, China.  This conveys a sense of tranquility.DSCF2767

Rocks are chosen based on their shape, texture, substance, color and softness.

Limestone rocks that have taken strange shapes due to erosion are among the most valued rocks for Chinese gardeners. Some rocks are deliberately immersed in fast running streams so that they are scoured for the effects.

Here is a view of a Chinese garden in Wuhan. Within the lake, there are strange shaped rocks artistically arranged.DSCF6093

Shown in more details are some rocks, on a larger scale, near a stone bridge in the same garden.DSCF6123

Similarly, on the next image, are highly eroded…

View original 69 more words

Billions Stolen From Libya By Rothschilds

Originally posted on endzog:

~THE MARTYR: SHAHID MUAMMAR AL GADDAFI~muammar dadaffi martyr shahid

WHY DID THE ROTHSCHILDS USE THEIR PUPPET, BOUGHT AND PAID FOR OR INDEBTED WESTERN REGIMES TO PUT NATO-AL QAEDA (THERE ARE TWO AL QAEDAS, THE ORIGINAL ONE IS SMALLER THAN THE NATO ONE) IN POWER IN LIBYA ALONGSIDE THEIR LONGSTANDING HISTORICAL ALLIES IN MISRATA AND BENGHAZI?

REMEMBER THE MANY SUITCASES FULL OF MILLIONS OF DOLLARS WHICH USED TO ‘DISSAPEAR’ IN IRAQ AND AFGHANISTAN? THE ANSWER IS THAT THE ROTHSCHILD CONTROLLED WESTERN INTELLIGENCE AGENCIES CIA/MI5/MOSSAD BOUGHT MOST OF AL QUAIDA TO USE AS THEIR PERSONAL MERCENARIES IN THE MIDDLE EAST IN ORDER TO ROB LIBYA AND SYRIA’S CENTRAL BANKS AND DEAL WITH ISRAEL’S ENEMIES AND FOR AMERICA’S JEWISH FEDERAL RESERVE BANKSTER PARASITES TO MAINTAIN THE DOLLAR AS THE RESERVE CURRENCY STANDARD.

AND THEY DID SO WITH THE HELP OF TWO, TWO-FACED ENEMIES OF THE LIBYAN PEOPLE; RUSSIA AND IRAN WHO PLAYED A DOUBLE GAME RIGHT UP UNTIL…

View original 1,460 more words